Freeware Listing: 256

  • Hash
  • License: Freeware
  • Rating

Forensic examiners often need to quickly obtain the hash values for potential evidence files for reports or to verify their results. Pinpoint Hash was created to allow users to quickly obtain the hash values for CRC-32, MD5, SHA-1 and SHA-256 hash values for any file and quickly copy the results to the clipboard for easy transport to any other application. Hash integrates into the Windows "Send to" menu for easy access from Windows Explorer. It's quick. It's simple. It's free. Enjoy..

  • Platform: Win2000, WinOther

FREE DiceLock Security JDigesterCheck GUI and JHashDigester .jar extension library. If in your process or software applications you have need for generating hash values for different type of information you can incorporate JHashDigester .jar extension library in your applications to generate the hash you need. Incorporate hash processors in your applications. JHashDiegester .jar extension library contains classes implementing SHA 1, SHA 224, SHA 256, SHA 384, SHA 512, RIPEMD 128, RIPEMD 160, RIPEMD 256, RIPEMD 320 hash algorithms. JHashDigester 5.0.0.1 is able to share data with JDiceChecker 5.

  • Platform: Java, Windows Server, Windows Vista, WinOther

FREE DiceLock Security JDigesterCheck GUI and JHashDigester .jar extension library. If in your process or software applications you have need for generating hash values for different type of information you can incorporate JHashDigester .jar extension library in your applications to generate the hash you need. Incorporate hash processors in your applications. JHashDiegester .jar extension library contains classes implementing SHA 1, SHA 224, SHA 256, SHA 384, SHA 512, RIPEMD 128, RIPEMD 160, RIPEMD 256, RIPEMD 320 hash algorithms. JHashDigester 5.0.0.1 is able to share data with JDiceChecker 5.

  • Platform: Java, Mac OS X, Mac OS X 10.4, Mac OS X 10.5

FREE DiceLock Security iHashDigester C++ iOS 5 '.a' static library for iPhone, iPad and iPod. If in your process or software applications you have need for hash computation, you can incorporate iHashDigester static library in your applications to generate the hash you need. Incorporate hash algorithms in your applications. C++ '.a' static library contains classes implementing SHA 1, SHA 224, SHA 256, SHA 384, SHA 512, RIPEMD 128, RIPEMD 160, RIPEMD 256, RIPEMD 320 hash algorithms. iHashDigester 5.0.0.1 is able to share data with iDiceChecker 5.0.0.1 random number test and iDiceLock 5.0.0.1 encryption cipher products.

  • Platform: iOS 4.x, WinOther

DPASHA created a single HASH. MD2, MD4, MD5 120bits, RIPEMD128 128bits, RIPEMD160 160bits, CRC32 32bits,CRC16 16bits, ARC-CRC 16bits, SHA1 160bits, SHA-256 256 bits, SHA-384 384 bits, SHA-512 512 bits, HAVAL128 128bits, HAVAL160 160bits, HAVAL192 192bits, HAVAL224 224bits, HAVAL256 256bits, Tiger128 128bits, Tiger160 160bits, Tiger192 192bits, GOST R 34.11-94, Sapphire, Panama, Whirlpool, Whirlpool 1, Square, Snefru 128 Bit, Snefru 256 Bit, RIPE MD 256 bit, RIPE MD 320 bit. Freeware version.You can test files for manipulations. Easy to use, supports Drag & Drop. All hashes are standard with all other hash programs and hashes.

  • Publisher: Paehl
  • Date: 14-08-2012
  • Size: 59 KB
  • Platform: WinOther

EAP-SRP-256 is password-based authentication method that has been designed to operate in wireless networks and relies on the SRP-6 protocol. This EAP method allows mutual authentication between client & server, deriving a set of symmetric keys..

  • Platform: Linux

This program is to batch convert images in 256 color bitmap format into ones with particular palletes used in games like Aok, AokTC, AoE/RoR etc. ( Age of empires series. )
Image converter for 256 color bitmaps License - Public Domain.

  • Platform: WinOther

BASIC-256 is an easy to use version of BASIC designed to teach anybody how to program. A built-in graphics mode lets them draw pictures on screen in minutes, and a set of easy-to-follow tutorials introduce programming concepts through fun exercises.
BASIC-256 License - GNU General Public License version 2.0 (GPLv2).

  • Publisher: Kidbasic
  • Date:
  • Size: 1682 KB
  • Platform: Linux, Mac OS X, Unix, WinOther

We are all well aware that a major problem in the IT industry is that there is a lack of quality Citrix 1Y0-256 Test Prep study materials. Our Certification Citrix 1Y0-256 Exam Preparation Materials provide you everything you will need to take a certification examination. Details are researched and produced by Certification Experts who are constantly using industry experience to produce precise, logical and verified explanations for the answers. You may get questions from different web sites or books, but logic is the key. Citrix 1Y0-256 Exam Preparation from Testking include: Comprehensive 1Y0-256 brain dumps questions with complete details Detailed explanations of all the questions (when available) Questions accompanied by exhibits Verified Answers Researched by Industry Experts Drag and Drop questions as experienced in the 1Y0-256...

  • Platform: Win2000, Windows Server, WinOther

We are all well aware that a major problem in the IT industry is that there is a lack of quality IBM 000-256 Test Prep study materials. Our Certification IBM 000-256 Exam Preparation Materials provide you everything you will need to take a certification examination. Details are researched and produced by Certification Experts who are constantly using industry experience to produce precise, logical and verified explanations for the answers. You may get questions from different web sites or books, but logic is the key. IBM 000-256 Exam Preparation from Testking include: Comprehensive 000-256 brain dumps questions with complete details Detailed explanations of all the questions (when available) Questions accompanied by exhibits Verified Answers Researched by Industry Experts Drag and Drop questions as experienced in the 000-256 study...

  • Platform: Win2000, Windows Server, WinOther

PC users have become more conscious and careful about privacy of their data these days, especially about the data they need to share with others. There are valid reasons for this trend. Instances of personal information theft and attacking are on rise and sometimes celebs and eminent personalities also fall prey to the malicious attackers! Fortunately, you can use various third party data encryption apps that enhance privacy of shared data. If you do not want to pay for data encryption software, try Quick Crypt.

Quick Crypt can be used on PCs with Windows Vista and later versions.

  • Platform: Win7 x32, Win7 x64, Windows 8, WinVista

KRyLack File Checksum Tool is advanced freeware utility to generate a MD5, SHA-1, HAVAL, MD2, SHA-256, SHA-384, SHA-512 hash from a file. A Hash (Checksum) is a sort of digital fingerprint, uniquely identifying each file. These are common hashes that are used to verify the integrity and authenticity of files. The software allows you to verify the Hash to ensure the file integrity is correct with the matching file or create new checksum for your important data. Many download sites list the MD5 hash along with the download link. Application is portable and does not require any installation..

  • Platform: Win2000, Win7 x32, Win7 x64, Windows 8, Windows Server, WinOther, WinVista, WinVista x64

PicoBackup Outlook Express Edition is an easy-to-use Outlook Express emails backup utility packed with many powerful features.Various methods of backup like full backup, incremental backup and multi-generation backup are supported, giving you full control on how to backup. Features: Flexible integrated scheduler, CD/DVD burning and spanning, 256-bit AES/Blowfish encryption, backup to remote FTP server, standard ZIP compression, email notification, detailed logging and more. Many different types of media are supported, including flash/thumb drives, Zip/Jazz drive, floppy drive..

  • Publisher: Acubix
  • Date: 20-06-2005
  • Size: 3453 KB
  • Platform: Win2000, Windows Server, WinOther

Free 256 Bit Encryption Software, Creates multiple encrypted virtual drive to store any type of data. It's powerful encryption ensures that only you can access your data. LockDisk creates a volume (vault) that can only be accessed with a password. This volume stores files in the encrypted form. Once mounted, the LockDisk drive is like any other drive you normally work with. It functions like any other drive (C: or D:) on your computer. Just drag and drop any file into the LockDisk Vault. It is automatically encrypted. It's that simple! LockDisk vaults can only be viewed, accessed, browsed or modified by the user who has the key to open it.

  • Publisher: Klonsoft
  • Date: 01-05-2005
  • Size: 1186 KB
  • Platform: Win2000, Windows Server, WinOther

With CommuniCrypt QuickHasher you can create a Hash value of a file or verify the authenticity of a file with an existing hash value. QuickHasher uses the modern SHA-2 Hash with 256 bit. The outdated MD5 is not supported. Requires VB6 runtime!.

  • Platform: Win2000, Windows Server, WinOther

File encryption/decryption tools with strongest AES algorithms. Can generate the hash of the source file as password for symmetric encryption(64 digits password). Encryption strength AES Rijndael: 256 bit / Hash: SHA-256.

  • Platform: Win2000, Windows Server, WinOther

Basic icon set in Autumn style. A collection of ready stock icons most often required for program design. Autumn stock icons are perfect for shareware developers and web designers, who need to create a first-class interface for their software, web application or game, but value their time and don't want to spend weeks and even months on waiting for the designer to finish his work. The eye-candy factor is way up in Autumn Icons and if you have ever had a yearning to make your competitors jealous, these are the right icons to make your software stand out of the crowd. Autumn Icons are available at site.

  • Platform: AS/400, BEOS, Handheld, Java, Linux, Linux Console, Linux Gnome, Linux GPL, Linux Open Source, Mac OS X, Mac PPC, MS-DOS, Netware, Not Applicable, OpenVMS, OS/2, Palm OS, Pocket PC, RIM, Symbian, Unix, Win2000, Windows CE, Windows Mobile, Windows Server, WinOther

Basic icon set in Autumn style. A collection of ready stock icons most often required for program design. Autumn stock icons are perfect for shareware developers and web designers, who need to create a first-class interface for their software, web application or game, but value their time and don't want to spend weeks and even months on waiting for the designer to finish his work. The eye-candy factor is way up in Autumn Icons and if you have ever had a yearning to make your competitors jealous, these are the right icons to make your software stand out of the crowd. Autumn Icons are available at http://www.

  • Platform: AS/400, BEOS, Handheld, Java, Linux, Linux Console, Linux Gnome, Linux GPL, Linux Open Source, Mac OS X, Mac PPC, MS-DOS, Netware, Not Applicable, OpenVMS, OS/2, Palm OS, Pocket PC, RIM, Symbian, Unix, Win2000, Windows CE, Windows Mobile, Windows Server, WinOther

Basic icon set in Autumn style. A collection of ready stock icons most often required for program design. Autumn stock icons are perfect for shareware developers and web designers, who need to create a first-class interface for their software, web application or game, but value their time and don't want to spend weeks and even months on waiting for the designer to finish his work. The eye-candy factor is way up in Autumn Icons and if you have ever had a yearning to make your competitors jealous, these are the right icons to make your software stand out of the crowd. Autumn Icons are available at http://www.

  • Platform: AS/400, BEOS, Handheld, Java, Linux, Linux Console, Linux Gnome, Linux GPL, Linux Open Source, Mac OS X, Mac PPC, MS-DOS, Netware, Not Applicable, OpenVMS, OS/2, Palm OS, Pocket PC, RIM, Symbian, Unix, Win2000, Windows CE, Windows Mobile, Windows Server, WinOther

Secure, Easy and Cost Effective Online Backup Service - Free 100 MB (Compressed) account that supports all the same features of the subscription accounts. Features include: 256 Bit EAS Encryption, Local copy option, email notification, backup registry, Restore Registry, Disaster Recovery, Version Control, Daily Scheduler and Automatic Server Reports of successful daily backups. Both Active and Passive Modes (Firewall Friendly) are supported. Current supported systems are Windows 2000, Windows XP and Windows 2003 Server. Backup Genie includes the option to run it as a System Service for unattended operation.

  • Platform: Win2000, Windows Server, WinOther

256: Freeware | All

New Reviews


Ocster 1-Click Backup

Nowadays, backing up is more of a necessity than ever before. Daily, people are experiencing hardware failures, computer crashes, and virus attacks that are damaging and destroying data, and in some cases just silly mistakes are causing people to ...


Windows WinBest

Windows WinBest is an application, created to speed up your computer and remove junk files from your system. Right from the second I opened Windows WinBest, I become very skeptical about whether I’d like this application. Almost instantly, I ...


Encrypt my Folder

It’s always a good idea to consider some kind of protection for your sensitive data, and encryption is a really good way of protecting files and folders containing personal or secret data. This is even more important for users who are ...


Simple Machines Forum (SMF)

SMF (Simple Machines Forums) is a piece of forum software that is very useful for any website owner (or anyone looking to own a website) who would like to add a community forum to their website, or indeed anyone with a forum already who would like ...


Trillian

If you are an avid internet user, you'll be having accounts and friends all over Google, Facebook, MySpace, MSN and other such networks. With multiple accounts and probably hundreds of friends distributed over these networks, it becomes ...


TopDesk

It feels better, when the main screen of the computer looks good. However, in most of the cases, you would find the main screen or desktop of the computer is filled with the ugly looking icons which spoil the beauty of your desktop, and there comes ...


Convert Image to PDF

Apex Images to PDF Converter is the simplistic and easy to use application that’ll turn raw image files, such as .jpegs, into PDF documents that will open in Adobe Reader.

It’s really easy to get started with this ...


Opera web browser

Opera is a free to download web browser, which is usually overlooked by the majority of people who use web browsers, in favour of the speed for google chrome, or the customisability for firefox. However opera certainly does have its own appeal ...


Public PC Desktop

More and more, access to a computer and the internet is becoming easier and easier to find. Many libraries, hotels, cafes and so on may have computers available for use by the general public. However this poses a problem to administrators, that ...



New Downloads

Clipboard Auto Clear

Worried about spy ware reading
your clipboard? Want to free
up the huge resources that
some clips consume? Clipboard
...

Clipdiary

Clipdiary is a clipboard
manager for keeping the
clipboard history. Install our
clipboard utility and you will
never lose ...

Edraw MindMaster

MindMaster is a cross-platform
and multi-functional mind
mapping software. It provides
effective mind mapping
solutions ...

TeraCopy

TeraCopy is a free utility
designed to copy files faster
and more secure. It can verify
copied files to ensure they
are ...

WinUtilities Free History
Cleaner

WinUtilities Free History
Cleaner is an Internet Eraser
that protects your Internet
privacy by cleaning up all the
tracks ...

MoneyLine Personal Finance
Free for Mac

MoneyLine Free Personal
Finance Software for Mac OS X
tracks all of your money,
spending, and bank accounts in
one place. ...

Express Burn Disc Burning
Software Free

Express Burn Disc Burning
Software Free lets you create
and record discs quickly and
easily. Perfect audio quality
is ...

Merry Meal Universal

Merry Meal - diet manager and
calorie calculator which also
includes vitamins and
minerals calculation. Will
help to ...

BOINC Monitor

BOINC Monitor shows BOINC
tasks progress. Resizable!
Save settings to file. Color
changeable for all gadget\'s
elements, ...



Related Searches

For Aids Cure
Obex Bluetooth
Plot Bode
Tester Brain
Your Inte Boost
Gpstuner And Maps
Maps Amiglobe
Body A Branding
Imports Cctv
Desire Club
Penguin Ga Club
Cursors Pointers